Ryo Nishimaki
Orcid: 0000-0002-5144-4619
According to our database1,
Ryo Nishimaki
authored at least 68 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
J. Cryptol., September, 2024
IACR Cryptol. ePrint Arch., 2024
Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
IACR Cryptol. ePrint Arch., 2024
2023
J. Cryptol., October, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
2021
J. Cryptol., 2021
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
IACR Cryptol. ePrint Arch., 2021
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication.
IACR Cryptol. ePrint Arch., 2021
2020
J. Cryptol., 2020
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark).
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
2018
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
2016
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
J. Cryptol., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES.
Des. Codes Cryptogr., 2015
2014
2013
Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Proceedings of the DIM'13, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2010
Proceedings of the Public Key Cryptography, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008